{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:53:49Z","timestamp":1765486429854,"version":"3.37.3"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-15-C-4066"],"award-info":[{"award-number":["N66001-15-C-4066"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ARO W911NF-16-1-0145","CNS- 1238959","CNS- 1239166","CNS- 1330599","CNS- 1704615","CNS-1238962","CNS-1239054","CNS-1514163","CNS-1564102","TWC-1518899"],"award-info":[{"award-number":["ARO W911NF-16-1-0145","CNS- 1238959","CNS- 1239166","CNS- 1330599","CNS- 1704615","CNS-1238962","CNS-1239054","CNS-1514163","CNS-1564102","TWC-1518899"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/msec.2020.2976984","type":"journal-article","created":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T02:39:51Z","timestamp":1585017591000},"page":"17-27","source":"Crossref","is-referenced-by-count":12,"title":["The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8525-4514","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"first","affiliation":[{"name":"Cornell Tech, New York United States"}]},{"given":"Warren","family":"He","sequence":"additional","affiliation":[{"name":"Oasis Labs, California United States"}]},{"given":"Raymond","family":"Cheng","sequence":"additional","affiliation":[{"name":"Oasis Labs, California United States"}]},{"given":"Jernej","family":"Kos","sequence":"additional","affiliation":[{"name":"Oasis Labs, San Francisco, California United States"}]},{"given":"Nicholas","family":"Hynes","sequence":"additional","affiliation":[{"name":"Oasis Labs, California United States"}]},{"given":"Noah","family":"Johnson","sequence":"additional","affiliation":[{"name":"University of California Berkeley, Berkeley, California United States"}]},{"given":"Ari","family":"Juels","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, New York United States"}]},{"given":"Andrew","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, Illinois United States"}]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Computer Science, University of California Berkeley, Berkeley, California United States"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.14722\/ndss.2019.23060"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/SP.2016.55"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.14722\/ndss.2017.23349"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1146\/annurev.bioeng.8.061505.095802"},{"key":"ref14","first-page":"1371","article-title":"Erays: Reverse engineering Ethereum&#x2019;s opaque smart contracts","author":"zhou","year":"0","journal-title":"Proc Usenix Security Symp"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/SPW.2015.27"},{"year":"0","journal-title":"IBISWorld","article-title":"Credit Bureaus & Rating Agencies in the US Market Size 2005&#x2013;2025","key":"ref16"},{"key":"ref17","article-title":"Equifax says cyberattack may have affected 143 million in the U.S.","author":"siegel bernard","year":"2017","journal-title":"NY Times"},{"year":"0","journal-title":"Credit data as a service","key":"ref18"},{"year":"0","journal-title":"Keystone","key":"ref19"},{"year":"2000","author":"canetti","journal-title":"Universally Composable Security A New Paradigm for Cryptographic Protocols","key":"ref4"},{"key":"ref3","article-title":"Proofs-of-delay and randomness beacons in Ethereum","author":"b\u00fcnz","year":"0","journal-title":"Proc IEEE Security and Privacy Blockchain (S&B)"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/0360-1323(93)90046-6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/EuroSP.2019.00023"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1561\/0400000042"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/3133956.3138824"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3319535.3363221"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3133956.3134106"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1057\/palgrave.jors.2601545"},{"year":"0","journal-title":"Ethereum","key":"ref20"},{"year":"0","journal-title":"rusty-machine","key":"ref22"},{"year":"0","journal-title":"Building the most powerful tools for distributed networks","key":"ref21"},{"year":"0","journal-title":"Ethereum Improvement Proposals","key":"ref24"},{"year":"0","journal-title":"Machine Learning Repository","key":"ref23"},{"year":"0","journal-title":"Ethereum blockchain explorer","key":"ref25"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8013\/9091349\/9044356-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/9091349\/09044356.pdf?arnumber=9044356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T19:43:51Z","timestamp":1651779831000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9044356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":25,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/msec.2020.2976984","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"type":"print","value":"1540-7993"},{"type":"electronic","value":"1558-4046"}],"subject":[],"published":{"date-parts":[[2020,5]]}}}